Attacks/Breaches
3/7/2011
06:09 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Data Breach Costs Continue Climbing

Some of that cost may be unnecessary, a study has found.

The average cost of a data breach for a U.S. company continues to rise, having reached $7.2 million in 2010.

This represents an increase of 7% from 2009, when the average cost was found to be $6.8 million, according to Symantec which published "2010 Annual Study: U.S. Cost of a Data Breach," and the Ponemon Institute, which conducted the research.

The cost of losing data has grown for U.S. companies every year since 2006.

Larry Ponemon, founder of the Ponemon Institute, says that there was one unusual finding: A rapid response to a breach, which generally involves notifying everyone potentially affected, turns out to be more costly than a slow response.

Increasingly sophisticated data security threats and compliance pressures are pushing organizations to respond as rapidly as possible to data breaches. This is reflected in the finding that malicious attacks have become the most costly cause of breaches. But responding quickly to a breach may not be called for in every instance.

This isn't to say a slow response is always good; rather, it reflects the survey's finding that rapid notification can be a waste of money if subsequent investigation indicates some of those notified were not affected after all.

"In the world of data breaches, telling people your data is lost or stolen and then having to change that doesn't help anyone," said Ponemon in a phone interview.

Quick responders paid $268 per record, an increase of 22% from 2009, while organizations that took more time paid $174 per record, a decrease of 11% from 2009.

Symantec has created an online data breach calculator to help companies assess the potential cost and likelihood of a data breach. Not coincidentally, Symantec sells security solutions, particularly those focused on encryption.

Encryption has become more popular lately because data breach regulations often exempt companies from notification requirements if the lost data was encrypted.

This trend is partially reflected in the survey, which found: an increase in the number of organizations with an "above average IT security posture"; a decrease in breaches due to system failure, lost or stolen devices, and third-party mistakes; and more companies responding faster and putting CISOs in charge of response management.

Negligence remains the most common cause of breach incidents (41%), followed by lost or stolen portable or mobile devices (35%), malicious attacks (31%), and system failure (27%).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7437
Published: 2015-03-29
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.

CVE-2013-7438
Published: 2015-03-29
Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...

CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.